Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Software-defined mobile networks security
Chen M., Qian Y., Mao S., Tang W., Yang X. Mobile Networks and Applications21 (5):729-743,2016.Type:Article
Date Reviewed: May 12 2017

The tremendous success of mobile devices and their applications raises a lot of questions regarding security, quality of service (QoS), and user satisfaction. It is therefore very important to address these challenges and provide cost-effective architectural solutions. One of them is software-defined mobile networks (SDMN), an extension of software-defined networking (SDN) that involves cloud computing and network function virtualization (NFV). The separation of the data layer from the control and application layers improves flexibility and scalability among several performance parameters, leading to an increased capacity for data traffic. However, there are challenges, the most important being posed by the security threats.

This paper addresses the research on the security challenge of SDMN by reviewing many research papers that discuss specific security threats and propose adequate countermeasures. The concepts of SDMN and OpenFlow as the main protocol are clearly defined at the beginning of the paper, allowing the reader to understand the architecture and easily follow the authors’ presentation. The paper is logically well structured, addressing the threats at all layers of the architecture and the communication protocols. For example, the authors discuss first the security problems associated with SDN that are inherited by SDMN, and then review the open security issues specific to SDMN. The list of references is comprehensive.

This paper can be recommended as a good starting point for researchers in the area of SDMN, or to fifth generation (5G) system designers.

Reviewer:  D. Grigoras Review #: CR145278 (1707-0455)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Mobile Processors (C.1.4 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
General (D.2.0 )
 
 
Computer-Communication Networks (C.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Mobile Processors": Date
Architectural optimizations for low-power, real-time speech recognition
Krishna R., Mahlke S., Austin T.  Compilers, architectures and synthesis for embedded systems (Proceedings of the international conference, San Jose, California, USA,220-231, 2003. Type: Proceedings
May 12 2004
Programming wireless devices with the Java 2 platform, micro edition
Riggs R., Huopaniemi J., Taivalsaari A., Patel M., Uotila A., Sun Microsystems, Inc., Mountain View, CA, 2003.  434, Type: Book (9780321197986)
Dec 17 2003
Mobile disruption: the technologies and applications that are driving the mobile Internet
Funk J., Wiley-Interscience, New York, NY, 2003.  211, Type: Book (9780471511229)
May 14 2004
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy